mirror of
https://gitlab.com/pulsechaincom/prysm-pulse.git
synced 2025-01-09 19:21:19 +00:00
cbc2153664
* Wallet recover CLI Manager migration * bazel run //:gazelle -- fix * Wallet create CLI Manager migration * Wallet recover CLI Manager migration (#11278) * Wallet recover CLI Manager migration * bazel run //:gazelle -- fix * fix lint and build errors * add TODO to remove duplicate code Co-authored-by: james-prysm <90280386+james-prysm@users.noreply.github.com> Co-authored-by: Radosław Kapka <rkapka@wp.pl> * Wallet recover CLI Manager migration * bazel run //:gazelle -- fix * Wallet recover CLI Manager migration * bazel run //:gazelle -- fix * Wallet recover CLI Manager migration * bazel run //:gazelle -- fix * fix lint and build errors * Wallet recover CLI Manager migration (#11278) * Wallet recover CLI Manager migration * bazel run //:gazelle -- fix * fix lint and build errors * add TODO to remove duplicate code Co-authored-by: james-prysm <90280386+james-prysm@users.noreply.github.com> Co-authored-by: Radosław Kapka <rkapka@wp.pl> * bazel run //:gazelle -- fix * rename to ConstructCLIManagerOpts Co-authored-by: james-prysm <90280386+james-prysm@users.noreply.github.com> Co-authored-by: Radosław Kapka <rkapka@wp.pl>
248 lines
8.0 KiB
Go
248 lines
8.0 KiB
Go
package wallet
|
|
|
|
import (
|
|
"context"
|
|
"flag"
|
|
"io"
|
|
"testing"
|
|
|
|
"github.com/pkg/errors"
|
|
cmdacc "github.com/prysmaticlabs/prysm/v3/cmd/validator/accounts"
|
|
"github.com/prysmaticlabs/prysm/v3/cmd/validator/flags"
|
|
"github.com/prysmaticlabs/prysm/v3/testing/assert"
|
|
"github.com/prysmaticlabs/prysm/v3/testing/require"
|
|
"github.com/prysmaticlabs/prysm/v3/validator/accounts"
|
|
"github.com/prysmaticlabs/prysm/v3/validator/accounts/wallet"
|
|
"github.com/prysmaticlabs/prysm/v3/validator/keymanager"
|
|
"github.com/prysmaticlabs/prysm/v3/validator/keymanager/local"
|
|
"github.com/prysmaticlabs/prysm/v3/validator/keymanager/remote"
|
|
"github.com/sirupsen/logrus"
|
|
logTest "github.com/sirupsen/logrus/hooks/test"
|
|
"github.com/urfave/cli/v2"
|
|
)
|
|
|
|
func init() {
|
|
logrus.SetLevel(logrus.DebugLevel)
|
|
logrus.SetOutput(io.Discard)
|
|
}
|
|
|
|
func TestCreateOrOpenWallet(t *testing.T) {
|
|
hook := logTest.NewGlobal()
|
|
walletDir, passwordsDir, walletPasswordFile := setupWalletAndPasswordsDir(t)
|
|
cliCtx := setupWalletCtx(t, &testWalletConfig{
|
|
walletDir: walletDir,
|
|
passwordsDir: passwordsDir,
|
|
keymanagerKind: keymanager.Local,
|
|
walletPasswordFile: walletPasswordFile,
|
|
})
|
|
createLocalWallet := func(cliCtx *cli.Context) (*wallet.Wallet, error) {
|
|
cfg, err := cmdacc.ExtractWalletDirPassword(cliCtx)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
w := wallet.New(&wallet.Config{
|
|
KeymanagerKind: keymanager.Local,
|
|
WalletDir: cfg.Dir,
|
|
WalletPassword: cfg.Password,
|
|
})
|
|
if err = accounts.CreateLocalKeymanagerWallet(cliCtx.Context, w); err != nil {
|
|
return nil, errors.Wrap(err, "could not create keymanager")
|
|
}
|
|
log.WithField("wallet-path", cfg.Dir).Info(
|
|
"Successfully created new wallet",
|
|
)
|
|
return w, nil
|
|
}
|
|
createdWallet, err := wallet.OpenWalletOrElseCli(cliCtx, createLocalWallet)
|
|
require.NoError(t, err)
|
|
require.LogsContain(t, hook, "Successfully created new wallet")
|
|
|
|
openedWallet, err := wallet.OpenWalletOrElseCli(cliCtx, createLocalWallet)
|
|
require.NoError(t, err)
|
|
assert.Equal(t, createdWallet.KeymanagerKind(), openedWallet.KeymanagerKind())
|
|
assert.Equal(t, createdWallet.AccountsDir(), openedWallet.AccountsDir())
|
|
}
|
|
|
|
func TestCreateWallet_Local(t *testing.T) {
|
|
walletDir, passwordsDir, walletPasswordFile := setupWalletAndPasswordsDir(t)
|
|
cliCtx := setupWalletCtx(t, &testWalletConfig{
|
|
walletDir: walletDir,
|
|
passwordsDir: passwordsDir,
|
|
keymanagerKind: keymanager.Local,
|
|
walletPasswordFile: walletPasswordFile,
|
|
})
|
|
|
|
// We attempt to create the wallet.
|
|
_, err := CreateAndSaveWalletCli(cliCtx)
|
|
require.NoError(t, err)
|
|
|
|
// We attempt to open the newly created wallet.
|
|
w, err := wallet.OpenWallet(cliCtx.Context, &wallet.Config{
|
|
WalletDir: walletDir,
|
|
})
|
|
assert.NoError(t, err)
|
|
_, err = w.ReadFileAtPath(cliCtx.Context, local.AccountsPath, local.AccountsKeystoreFileName)
|
|
require.NoError(t, err)
|
|
}
|
|
|
|
func TestCreateWallet_Derived(t *testing.T) {
|
|
walletDir, passwordsDir, passwordFile := setupWalletAndPasswordsDir(t)
|
|
cliCtx := setupWalletCtx(t, &testWalletConfig{
|
|
walletDir: walletDir,
|
|
passwordsDir: passwordsDir,
|
|
walletPasswordFile: passwordFile,
|
|
keymanagerKind: keymanager.Derived,
|
|
numAccounts: 1,
|
|
})
|
|
|
|
// We attempt to create the wallet.
|
|
_, err := CreateAndSaveWalletCli(cliCtx)
|
|
require.NoError(t, err)
|
|
|
|
// We attempt to open the newly created wallet.
|
|
_, err = wallet.OpenWallet(cliCtx.Context, &wallet.Config{
|
|
WalletDir: walletDir,
|
|
})
|
|
assert.NoError(t, err)
|
|
}
|
|
|
|
// TestCreateWallet_WalletAlreadyExists checks for expected error if trying to create a wallet when there is one already.
|
|
func TestCreateWallet_WalletAlreadyExists(t *testing.T) {
|
|
walletDir, passwordsDir, passwordFile := setupWalletAndPasswordsDir(t)
|
|
cliCtx := setupWalletCtx(t, &testWalletConfig{
|
|
walletDir: walletDir,
|
|
passwordsDir: passwordsDir,
|
|
walletPasswordFile: passwordFile,
|
|
keymanagerKind: keymanager.Derived,
|
|
numAccounts: 1,
|
|
})
|
|
|
|
// We attempt to create the wallet.
|
|
_, err := CreateAndSaveWalletCli(cliCtx)
|
|
require.NoError(t, err)
|
|
|
|
// We attempt to create another wallet of the same type at the same location. We expect an error.
|
|
_, err = CreateAndSaveWalletCli(cliCtx)
|
|
require.ErrorContains(t, "already exists", err)
|
|
|
|
cliCtx = setupWalletCtx(t, &testWalletConfig{
|
|
walletDir: walletDir,
|
|
passwordsDir: passwordsDir,
|
|
walletPasswordFile: passwordFile,
|
|
keymanagerKind: keymanager.Local,
|
|
})
|
|
|
|
// We attempt to create another wallet of different type at the same location. We expect an error.
|
|
_, err = CreateAndSaveWalletCli(cliCtx)
|
|
require.ErrorContains(t, "already exists", err)
|
|
}
|
|
|
|
func TestCreateWallet_Remote(t *testing.T) {
|
|
walletDir, _, walletPasswordFile := setupWalletAndPasswordsDir(t)
|
|
wantCfg := &remote.KeymanagerOpts{
|
|
RemoteCertificate: &remote.CertificateConfig{
|
|
RequireTls: true,
|
|
ClientCertPath: "/tmp/client.crt",
|
|
ClientKeyPath: "/tmp/client.key",
|
|
CACertPath: "/tmp/ca.crt",
|
|
},
|
|
RemoteAddr: "host.example.com:4000",
|
|
}
|
|
app := cli.App{}
|
|
set := flag.NewFlagSet("test", 0)
|
|
keymanagerKind := "remote"
|
|
set.String(flags.WalletDirFlag.Name, walletDir, "")
|
|
set.String(flags.WalletPasswordFileFlag.Name, walletDir, "")
|
|
set.String(flags.KeymanagerKindFlag.Name, keymanagerKind, "")
|
|
set.String(flags.GrpcRemoteAddressFlag.Name, wantCfg.RemoteAddr, "")
|
|
set.String(flags.RemoteSignerCertPathFlag.Name, wantCfg.RemoteCertificate.ClientCertPath, "")
|
|
set.String(flags.RemoteSignerKeyPathFlag.Name, wantCfg.RemoteCertificate.ClientKeyPath, "")
|
|
set.String(flags.RemoteSignerCACertPathFlag.Name, wantCfg.RemoteCertificate.CACertPath, "")
|
|
assert.NoError(t, set.Set(flags.WalletDirFlag.Name, walletDir))
|
|
assert.NoError(t, set.Set(flags.WalletPasswordFileFlag.Name, walletPasswordFile))
|
|
assert.NoError(t, set.Set(flags.KeymanagerKindFlag.Name, keymanagerKind))
|
|
assert.NoError(t, set.Set(flags.GrpcRemoteAddressFlag.Name, wantCfg.RemoteAddr))
|
|
assert.NoError(t, set.Set(flags.RemoteSignerCertPathFlag.Name, wantCfg.RemoteCertificate.ClientCertPath))
|
|
assert.NoError(t, set.Set(flags.RemoteSignerKeyPathFlag.Name, wantCfg.RemoteCertificate.ClientKeyPath))
|
|
assert.NoError(t, set.Set(flags.RemoteSignerCACertPathFlag.Name, wantCfg.RemoteCertificate.CACertPath))
|
|
cliCtx := cli.NewContext(&app, set, nil)
|
|
|
|
// We attempt to create the wallet.
|
|
_, err := CreateAndSaveWalletCli(cliCtx)
|
|
require.NoError(t, err)
|
|
|
|
// We attempt to open the newly created wallet.
|
|
ctx := context.Background()
|
|
w, err := wallet.OpenWallet(cliCtx.Context, &wallet.Config{
|
|
WalletDir: walletDir,
|
|
})
|
|
assert.NoError(t, err)
|
|
|
|
// We read the keymanager config for the newly created wallet.
|
|
encoded, err := w.ReadKeymanagerConfigFromDisk(ctx)
|
|
assert.NoError(t, err)
|
|
cfg, err := remote.UnmarshalOptionsFile(encoded)
|
|
assert.NoError(t, err)
|
|
|
|
// We assert the created configuration was as desired.
|
|
assert.DeepEqual(t, wantCfg, cfg)
|
|
}
|
|
|
|
func TestInputKeymanagerKind(t *testing.T) {
|
|
tests := []struct {
|
|
name string
|
|
args string
|
|
want keymanager.Kind
|
|
wantErr bool
|
|
}{
|
|
{
|
|
name: "local returns local kind",
|
|
args: "local",
|
|
want: keymanager.Local,
|
|
wantErr: false,
|
|
},
|
|
{
|
|
name: "direct returns local kind",
|
|
args: "direct",
|
|
want: keymanager.Local,
|
|
wantErr: false,
|
|
},
|
|
{
|
|
name: "imported returns local kind",
|
|
args: "imported",
|
|
want: keymanager.Local,
|
|
wantErr: false,
|
|
},
|
|
{
|
|
name: "derived returns derived kind",
|
|
args: "derived",
|
|
want: keymanager.Derived,
|
|
wantErr: false,
|
|
},
|
|
{
|
|
name: "remote returns remote kind",
|
|
args: "remote",
|
|
want: keymanager.Remote,
|
|
wantErr: false,
|
|
},
|
|
{
|
|
name: "REMOTE (capitalized) returns remote kind",
|
|
args: "REMOTE",
|
|
want: keymanager.Remote,
|
|
wantErr: false,
|
|
},
|
|
}
|
|
for _, tt := range tests {
|
|
t.Run(tt.name, func(t *testing.T) {
|
|
app := cli.App{}
|
|
set := flag.NewFlagSet("test", 0)
|
|
set.String(flags.KeymanagerKindFlag.Name, tt.args, "")
|
|
assert.NoError(t, set.Set(flags.KeymanagerKindFlag.Name, tt.args))
|
|
cliCtx := cli.NewContext(&app, set, nil)
|
|
got, err := inputKeymanagerKind(cliCtx)
|
|
assert.NoError(t, err)
|
|
assert.Equal(t, tt.want.String(), got.String())
|
|
})
|
|
}
|
|
}
|